Software

Everyone who knows what Usenet is and downloads binaries from it regularly, is familiar with the main problem of this network - it's not censored and nobody verifies the files posted to it. Nobody cares about verifying Nzb files that will be uploaded to Usenet daily. This leads to such problems like fake, password protected, virus infected or incomplete archives. Classical search engines like Binsearch, NZBClub or NZBIndex provide a Usenet search and just index the Nzbs without real check of its quality. Also many new Newznab based indexers appeared on the market have no possibility to verify the content and provide high quality search. This was my motivation to write about new, innovative service - Usenet browser UsenetHub.
...

The Pirate Bay owners announced the release of new browser that was created for everyone who wishes to avoid censorship from his Internet Service Provider.

New PirateBrowser is a bundle package that can be configured to circumvent the blockade for torrent sites launched in countries such as Iran, North Korea, United Kingdom, The Netherlands, Belgium, Finland, Denmark, Italy and Ireland.
...

The company BitTorrent – developer of the popular torrent client uTorrent – released a client Sync for the Android operating system. The new program enables secure synchronization of files between devices and is available for smartphones and tablets.

The principle of working of BitTorrent Sync is the same as that of Dropbox, Google Drive or “Yandex.Disk": the user himself creates a "magic" folder that can be accessed from any device connected to the Internet. The new service has a number of notable advantages over other "cloud" systems.
...

Undoubtedly, the pirates are faster as Ferrary Spider on the German roads without limits. It can take no longer as just few hours after release to crack the software and spread it all over the world using such share technologies like Bittorrent, Peer-2-Peer or Usenet networks. Me personally knew a guy who was able to crack any art of software programs in minutes, not depending if it were Windows or other software companies and which security mechanisms they use to protect their digital products.
...

Bittorrent protocol is one of the most used technologies to share files online. Millions of users use it daily to upload and download content between peers. Using torrents is very simple and doesn't require any special computer knowlegde. All you need is a Bittorrent download client and a source with provided .torrent files.

Below is a list of most popular and convenient clients for Windows PC and Mac OS:
...

Just last week, news broke that the NYPD would soon begin rolling out new tech that brings together information streams like CCTV footage and criminal databases. Developed in partnership with Microsoft, it’s dubbed (with disturbing blandness) the “Domain Awareness System.”
...

The final build of Windows 8 has leaked to the internet, just a day after Microsoft confirmed it had finished the development cycle for the new operating system. Although MSDN and TechNet customers won't officially receive access to the final Windows 8 bits until August 15th, an Enterprise version of Windows 8 is available widely across various file sharing sites.
...

Cybercriminals create boobytrapped PDF files, exploiting vulnerabilities in PDF reading software such as Adobe Reader, and either spam them out to unsuspecting victims or plant them on websites where they lie in wait for visitors.
...

A Russian hacker has posted a YouTube video and accompanying instructions on how to get around having to pay for in-app purchase content in iOS apps. 9to5Mac found the video and posted a report on Friday.
...

Today at its annual Worldwide Partner Conference in Toronto, Microsoft shared some more information on the upcoming availability of Windows 8.

The company confirmed that the next-generation platform would be released to manufacturing in the first week of August, so that its partners would have enough time to get their devices ready for general availability.
...